Connect public, paid and private patent data with Google Patents Public Datasets

Method and system for temporary network identity

Download PDF

Info

Publication number
US6937976B2
US6937976B2 US09901518 US90151801A US6937976B2 US 6937976 B2 US6937976 B2 US 6937976B2 US 09901518 US09901518 US 09901518 US 90151801 A US90151801 A US 90151801A US 6937976 B2 US6937976 B2 US 6937976B2
Authority
US
Grant status
Grant
Patent type
Prior art keywords
identity
service
provider
user
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US09901518
Other versions
US20030009593A1 (en )
Inventor
Naresh Anant Apte
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HP Inc
Hewlett-Packard Development Co LP
Original Assignee
Hewlett-Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Abstract

A method for network communications comprises assigning a temporary fictitious identity from a identity intermediary to at least one of a service provider and a user interface and performing a transaction between the user interface and the service provider using the temporary fictitious identity. A network identity intermediary system comprises a controller configured for assigning a temporary identity to at least one of a user interface and a service provider, and a database configured for maintaining private information of the at least one user interface and service provider in association with the temporary fictitious identity.

Description

THE FIELD OF THE INVENTION

The present invention relates to network browsing, and more particularly, to information privacy in network browsing.

BACKGROUND OF THE INVENTION

The Internet has created an entirely new form of commerce. Consumers can browse on the internet among many different online merchants that provide information and/or goods and services. However, while most people can shop within a retail center in relative anonymity, those surfing the web typically must reveal more information about themselves than is desirable.

Accordingly, this new commercial freedom comes at potentially large price. Consumers are increasingly subject to theft of their identities. Unscrupulous people capture an unsuspecting consumer's social security number, or other vital information, and then assume the consumer's personal and financial identity. Of course, part of the increasing trend of identity theft arises from the great frequency that consumers are asked to divulge personal data and financial data to carry out a financial transaction or obtain some service. Accordingly, for internet commerce to survive and thrive, the problem of personal and financial identity theft must be tackled.

In response, various privacy service providers have attempted to restore consumers to a state of anonymity while searching the web. For example, at least one type of conventional service provider permits users to pass through their web server, which blocks any personal identity information on the user's web browser from being observed by an online information or goods/services merchant. However, anonymous web browsing will not be useful for those desiring to carryout a transaction on the Internet, since the online merchant or service provider must know who they are providing the services to, have assurance of receiving payment, and must know where to deliver any information, goods, and/or services.

On the other hand, other conventional service providers will certify the identity of a web user or of an online merchant so that each partner in an information or goods/services transaction is assured of whom they are dealing with. These service providers also commonly offer to provide a payment receiving service for the online merchants to permit users to securely pay by credit card without getting their credit information intercepted by computer thieves

Unfortunately, all of these conventional systems lack in one regard or another. Anonymous web browsing prevents many desirable financial or information transactions since the service provider needs to know who will receive the services and the method of payment. On the other hand, while certification of one's identity assures transactional partners of who they are dealing with and can offer secure payment systems, much personal and information is revealed from the user to an online merchant. Accordingly, for those seeking to limit the personal information divulged while still carry out a network transaction, a quandary is faced. Either remain anonymous and forgo many advantageous commercial transactions on the internet, or forfeit your anonymity and hope that certification and secure payment systems will provide sufficient protection and security for your personal and financial information.

SUMMARY OF THE INVENTION

A method for network communication of the present invention comprises assigning a temporary identity from an identity intermediary to at least one of a service provider and a user interface and performing a transaction between the user interface and the service provider using the temporary identity.

A network identity intermediary system of the present invention comprises a controller configured for assigning a temporary identity to at least one of a user interface and a service provider, and a database configured for maintaining private information of the at least one user interface and service provider in association with the temporary identity.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an identity intermediary system, according to one embodiment of the present invention.

FIG. 2 is a block diagram of a database of an identity intermediary system, according to one embodiment of the present invention.

FIG. 3 is a block diagram of a communication pathway of an identity intermediary system, according to one embodiment of the present invention.

FIG. 4 is a flow diagram of an identity intermediary method, according to one embodiment of the present invention.

FIG. 5 is a flow diagram of an alternate identity intermediary method, according to one embodiment of the present invention.

FIG. 6 is a block diagram of a web site of the identity intermediary system, according to one embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. The following detailed description, therefore, is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims.

A method and system of the present invention facilitates pseudonymous network transactions between a user interface and a service provider by providing at least one, or both of the user interface and the service provider with a temporary network identity that is unique and definite, but fictitious. Despite the fictitious nature of the temporary identity, the user interface and the service provider are willing to undertake the transaction because of the trust engendered by the nature and recognizable source of the identity intermediary that issues the temporary identity. The transaction can be an exchange of information only, or can also include financial information as well as location information. The identity intermediary also can perform financial transactions and delivery services between the user interface and the service provider to facilitate the transaction occurring pseudonymously.

The method and system of the present invention provides consumers and businesses with an alternative to anonymous web browsing in that a real information exchange can occur or service be provided while preserving the security and privacy of personal or business information. It is difficult in conventional anonymous web browsing to send or receive payment or goods/services when the partners to the transaction do not know who they are dealing with. Moreover, the method and system of the present invention provides an advantage over services which merely certify the known real identity of a transaction partner. In that conventional arrangement, the transaction is carried out because each partner is assured of the identity of the other partner through certification. However, the partners cannot do so without revealing their identity, which may not be desirable for a variety of privacy, strategic or other concerns. Accordingly, a method and system of the present invention alleviates these problems by fostering transactions using unique and definite, yet fictitious identities that can be trusted because of their issuance by a know identity intermediary. In addition, the fictitious identities are temporary and uniquely and randomly assigned for each transaction so that the identities cannot be co-opted by either partner to the transaction or by unscrupulous third parties.

Components of the present invention may be implemented in hardware via a microprocessor, programmable logic, or state machine, in firmware, or in software within a given device. In one aspect, at least a portion of the software programming is web-based and written in HTML and JAVA programming languages, including links to graphical user interfaces, such as via windows-based operating system. The components may communicate via a network using a communication bus protocol. For example, the present invention may or may not use a TCP/IP protocol suite for data transport. Other programming languages and communication bus protocols suitable for use with the present invention will become apparent to those skilled in the art after reading the present application. Components of the present invention may reside in software on one or more computer-readable mediums. The term computer-readable mediums as used herein is defined to include any kind of memory, volatile or non-volatile, such as floppy disks, hard disks, CD-ROMs, flash memory, read-only memory (ROM), and random access memory (RAM).

A system according to the present invention is illustrated generally at 10 in FIG. 1. System 10 includes internet-capable device 20 having user interface 22, identity intermediary 24, primary service provider 26, secondary service provider 28, financial services network 30, and delivery services network 32. System 10 also further comprises network communication link 34.

System 10 further comprises temporary identity 50, which is associated with user interface 22, and which includes personal component 52, financial component 54, and/or location component 56. Likewise, system 10 includes business temporary identity 60, which is associated with primary service provider 26, and which includes business component 62, financial component 64, and/or location component 66.

Both identity intermediary 24 and primary service provider 26 include controller 70 while identity intermediary 24 further comprises database 72. Finally, financial services network 30 includes user bank 80 and service provider bank 82.

User interface 22 on Internet-capable device 20 permits user access to system 10. User interface 22 is preferably an Internet browser such as Internet Explorer® or Netscape Navigator®. Internet device 20 includes, for example an input device such as a keyboard and/or mouse and a display device such as a monitor, as is well known in the art. Accordingly Internet device 20 may include a desktop computer, notebook computer, personal digital assistants (PDA), mobile phone or other device known in the art, such as Internet appliances, for conducting network and Internet communications.

In one aspect, user interface 20 runs on an operating system which can support one or more applications. The operating system is stored in memory and executes on a processor. The operating system is preferably a multi-tasking operating system which allows simultaneous execution of multiple applications, although aspects of this invention may be implemented using a single-tasking operating system. The operating system employs a graphical user interface windowing environment which presents the applications or documents in specially delineated areas of the display screen called “windows”. Each window has its own adjustable boundaries which allow the user to enlarge or shrink the application or document relative to the display screen. Each window can act independently, including its own menu, toolbar, pointers, and other controls, as if it were a virtual display device. Other software tools may be employed via the window, such as a spreadsheet for collecting data. One preferred operating system is a Windows® brand operating system sold by Microsoft Corporation. However, other operating systems which provide windowing environments may be employed, such as those available from Apple Corporation or IBM. Alternatively, a non-windowing environment may be employed.

Identity intermediary 24 is any network site capable of being accessed via network communication link 34, and which provides temporary identities to facilitate pseudonymous network communications and transactions between service providers 26 and user interface 22.

Identity intermediary 24, including controller 70, can be implemented in hardware via a microprocessor, programmable logic device, or state machine, and firmware, or in software within a given device. In one aspect, at least a portion of the software programming is written in Java programming language, and each of the main components communicate using a communication bus protocol. For example, the present invention optionally can use a TCP/IP protocol suite for data transport. Other programming languages in communication bus protocols suitable for use with system 10 will be apparent to those skilled in the art.

Controller 70 includes hardware, software, firmware or combination of these. In one preferred embodiment controller 70 includes a computer server or other microprocessor based system capable of performing a sequence and logic operations. In addition, controller 70 can include a microprocessor embedded systems/appliance incorporating tailored appliance hardware and/or dedicated single purpose hardware. Controller 70 for primary service provider 26 is configured substantially similar to controller 70 of identity intermediary 24.

Network communication link 34, as used herein, includes an Internet communication link (e.g., the Internet), an intranet communication link, or similar high-speed communication link. In one preferred embodiment, network communication link 34 includes an Internet communication link 35. Internet communication link 35 permits communication between user interface 22, identity intermediary 24, primary service provider 26, secondary service provider 28, financial services network 30, and delivery services network 32.

Primary service provider 26 is any network based entity that performs transactions with user interface 22. Transactions include providing information, or exchanging information, as well as sending and receiving financial payment and other financial exchanges. Finally, transactions include delivery or reception of goods and services between primary service provider 26 and user interface 22. Service provider 26 ordinarily operates as an online storefront on the World Wide Web or other network navigable by user interface 22. Secondary service provider 28 is associated with primary service provider 26 and acts as a subcontractor to provide one or more components of information and/or goods/services offered by primary service provider 26. For example, user interface 22 may contact primary service provider 26 for travel services in which case primary service provider 26 directs user interface 22 to secondary service provider 28 for making hotel reservations.

Financial services network 30 comprises one or more entities necessary to initiate and complete electronic financial transactions between user interface 22 and primary service provider 26. User bank 80 is a bank or credit institution associated with user interface 22 while service provider bank 82 is a bank or credit institution associated with primary service provider 26 or secondary service provider 28. Delivery services network 32 provides delivery of goods and services between user interface 22 and primary service provider 26 either electronically or physically (e.g. FedEx®).

To provide user interface 22 or primary service provider 26 with a temporary identity, identity intermediary 24 operates database 72. As shown in FIG. 2, database 72 further includes one or more mapped data modules 102, which store temporary identities issued by identity intermediary 24 and corresponding personal information associated with user interface 22 or primary service provider 26. In particular, module 102 includes personal ID 104, financial ID 106, and location ID 108, as well as name 110, Social Security number (SSN) 112, credit card/bank number 114 and street address/IP address 116. Database 72 further comprises individual components such as user database 120 and server provider database 122, as well as encryption function 124.

Personal ID 104, financial ID 106, and location ID 108, each form a component of a temporary identity issued by identity intermediary 24. Only one, or any combination of these components, can comprise temporary identity 50 or 60. In particular, once assigned to user interface 22, personal ID 104, financial ID 106, and location ID 108, respectively correspond to personal ID 52 financial ID 54 and location ID 56 of temporary identity 50 for user interface 22, and respectively correspond to business ID 62, financial ID 64, and location ID 66 of temporary identity 60 for primary service provider 26.

Each of these components provides a fictitious or pseudonymous identity temporarily associated with user interface 22 or primary service provider 26 to facilitate network transactions between user interface 22 and primary service provider 26 while maintaining some level of privacy and security as to who is part of the transaction and as to what information is conveyed. Accordingly, personal ID 104 is a temporary pseudonymous identity associated with a real personal name 110 and other information which uniquely identifies the person such as a Social Security number 112. Financial ID 106 is a temporary pseudonymous identity associated with real unique financial information that is used by the person or entity to carry out financial transactions such as credit card/bank number 114. Finally, location ID 108 is a temporary pseudonymous identity associated with a real physical location or network location at which the person or entity resides for sending and/or receiving good/services, such as street address/IP address 116.

User database 120 represents a plurality or array of modules 102 that include a variety of temporary identities (104,106,108) associated with personal information of consumers for user interfaces 22. Likewise service provider database 122 represents a plurality of modules 102 that include a variety of temporary identities (104,106,108) associated with business information of service providers that transact with consumers via user interfaces 22. Each temporary identity is exclusively associated with a single real identity (personal, financial, and/or location). Finally, encryption function 124 permits database 72 to be encrypted with secure data mapping techniques known to those skilled in the art to maintain the privacy of information of consumers and service providers, as well as to protect the security of the assigned to the temporary identities (104,106,108) to the real identities for preserving the pseudonymous status of user interfaces 22 and/or service providers 26 in network transactions.

FIG. 3 illustrates a pattern of communication pathways between user interface 22, service provider 26 and identity intermediary 24, including pathways A, B, and C. In a first arrangement, user interface 22 first contacts identity intermediary 24 via pathway A to obtain a temporary identity prior to contacting service provider 26. After obtaining the temporary identity, user interface 22 proceeds to contact service provider 26 via pathway B or pathway C. Pathway B is used when identity intermediary 24 allows user interface 22 to pass through controller 70 of identity intermediary 24 to block any personally identifiable information associated with user interface 22, such as a Web browser, from being viewed by service provider 26.

Alternatively, once the temporary identity is assigned to user interface 22, user interface 22 may proceed to contact service provider 26 via pathway C. In this arrangement, the temporary identity is provided by a mask associated with user interface 22 that does not require each network communication to be passed through identity intermediary 24 to maintain the pseudonymous status of user interface 22.

In another arrangement, user interface 22 first contacts service provider 26 via pathway C. Then, either at the initiative of user interface 22 or of service provider 26, a temporary identity is sought from identity intermediary 24 for user interface 22 and/or service provider 26 via pathway B. Once the temporary identity is assigned to either one or both of user interface 22 and service provider 26, then user interface 22 and service provider 26 carry out the desired network transactions between them.

Finally, when a network transaction between user interface 22 and service provider 26 includes financial information, financial services network 30 is optionally available to identity intermediary 24 so that identity intermediary 24 can facilitate a real financial transaction between user interface 22 and service provider 26 while maintaining the pseudonymous status of user interface 22 and/or service provider 26 with respect to each other.

FIG. 4 illustrates a method 250 of network transactions of the present invention using system 10 and communication pathways 200. In a first step (252), via user interface 22, a user contacts primary service provider 26. Next, the user requests information and/or goods/services from primary service provider 26 via user interface 22 (step 256). To perform a network transaction with personal identity and financial security, user interface 22 and/or primary service provider 26 requests a temporary identity from identity intermediary 24 (step 258). Identity intermediary 24 then assigns temporary identities (e.g. personal ID 104, financial ID 106, and/or location ID 108) to one or both of user interface and primary service provider 26 (step 260). As identity intermediary 24 assigns temporary identities, it tracks the use of those identities and optionally bills user interface 22 and/or primary service provider 26 to receive payment for the service of providing and maintaining those identities (step 262). Primary service provider 26 then provides information and/or goods/services to user interface 22 using the temporary identities of user interface 22 and/or primary service provider 26 (step 264). Where the network transaction between user interface 22 and primary service provider 26 is a financial one, then user interface 22 pays primary service provider 26 via a temporary identity, such as financial ID 106. Similarly, where primary service provider 26 provides goods/services to user interface 22, and those goods are delivered to the user at a real physical location or network address via location ID 108.

In another method 300, prior to contacting any service providers 26 via user interface 22, consumer visits identity intermediary 24 (step 302). Identity intermediary 24 assigns user interface 22 a temporary identity, such as one or more of personal ID 104, financial ID 106 and location ID 108 (step 304). User interface 22 assumes the temporary identity by Web browser masking, or passing through a server of identity intermediary 24, using techniques known to those skilled in the art (step 306). At this point in time or later, identity intermediary optionally bills user interface 22 and/or service provider 26 for the service of providing a maintaining the temporary identity.

Next, via temporary identity of user interface 22, the user visits primary service provider 26 and requests information and/or goods/services (step 310). Primary service provider 26 delivers the information or goods services to user interface 22 using the temporary identity (step 312). Prior to step 312, primary service provider 26 optionally acquires a temporary identity for themselves (business, financial, and/or location) for providing information and/or goods/services to user interface 22 (step 314).

Next, as part of providing information or goods and services to user interface 22, primary service provider 26 optionally requires secondary service provider 28 to provide a portion or all of the information and/or goods/services to user interface 22 via the temporary identity of user interface 22 (step 316). In a further optional step, the activity and/or existence of secondary service provider 28 is shielded from user interface 22 by the temporary identity of primary service provider 26 so that user interface 22 is unaware of the role played by secondary service provider 28. At the same time, since user interface 22 is protected by their own temporary identity, the role played by secondary service provider 28 should be of little consequence to user interface 22.

In either method 250 or 300, a temporary identity is preferably generated randomly and assigned for each transaction between user interface 22 and service provider 26. Accordingly, a new temporary identity is issued for each transaction. However, other techniques optionally can be employed such as permitting the temporary identity to be used for a predetermined number of communications or for a predetermined period of time.

To facilitate providing temporary identities, identity intermediary 24 operates a network site 400 (e.g, web site) for communicating with user interface 22 and service providers 26. As shown in FIG. 6, site 400 includes password function 402, login function 404 and registration module 410. Registration module 410 includes personal information 412, address information 414, and financial information 416. Personal information 412 includes a name or business and social security number or tax ID. Address information 414 includes a street address, IP address, or other physical or network location identification. Financial information 416 includes credit card numbers, bank account numbers or other financial identification information. Site 400 also includes account status function 430 to permit user interface 22 or service provider 26 to monitor their accounts with site 400.

Finally, site 400 includes identity selection module 431 including browser mask function 432, server pass-through function 434 and substitute browser function 436. Identity selection module 431 permits user interface 22 or service provider 26 to select a method by which the temporary identity is provided. For example, browser mask function 432 uses an existing browser of user interface 22 or network interface of service provider 26, combined with masking protocols to obscure the real identity of user interface 22 or service provider 26. Server pass-through function 434 provides a temporary identity by funneling all communications between interface 22 and service provider 26 through a server of identity intermediary 24 at which the real identity is blocked and a pseudonymous identity is applied to user interface 22 or service provider 26. Finally, substitute browser function 436 applies a temporary identity by rendering user interface 22 or service provider 26 as a temporary pseudonymous network interface such as a new browser. This pseudonymous browser preferably identifies identity intermediary 24 as the source for the browser so that all participants in a transaction with that browser recognize the trust engendered by identity intermediary 24 in that transaction.

Accordingly, from a method and system of the present invention for carries numerous advantages. The method and system of the present invention facilitates pseudonymous network transactions between a user interface and a service provider by providing at least one, or both of the user interface and the service provider with a temporary network identity that is unique and definite, but fictitious. Despite the fictitious nature of the temporary identity, the user interface and the service provider are willing to undertake the transaction because of the trust engendered by the nature and recognizable source of the identity intermediary that issues the temporary identity. The transaction can be an exchange of information only, or can also include financial information as well as location information. The identity intermediary also can perform financial transactions and delivery services between the user interface and the service provider to facilitate the transaction occurring pseudonymously. The fictitious identities are temporary and uniquely and randomly assigned for each transaction so that the identities cannot be co-opted by either partner to the transaction or by unscrupulous third parties.

While specific embodiments have been illustrated and described, herein for purposes of description of the preferred embodiment, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described without departing from the scope of the present invention. Those with skill in the chemical, mechanical, electromechanical, electrical, and computer arts will readily appreciate that the present invention may be implemented in a very wide variety of embodiments. This application is intended to cover any adaptations or variations of the preferred embodiments discussed herein. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.

Claims (31)

1. A method for network communications comprising:
assigning a first temporary fictitious identity from an identity intermediary to a service provider;
performing a transaction between a user interface and the service provider using the first temporary fictitious identity.
2. The method of claim 1 wherein assigning a first temporary fictitious identity further comprises:
generating the first temporary fictitious identity randomly each time that the user interface and the service provider desire to enter a transaction with each other.
3. The method of claim 1 and further comprising:
associating the first temporary identity with the service provider;
providing the service provider as a primary service provider and linking the primary service provider to a secondary service provider, which assists the primary service provider in providing at least one of information, goods, and services to the user interface; and
performing the transaction with the first temporary fictitious identity to conceal the existence of, and real identity of, the secondary service provider from the user interface.
4. The method of claim 1 and further comprising:
associating a second temporary identity with the user interface;
providing the service provider as a primary service provider and linking the primary service provider to a secondary service provider, which assists the primary service provider in providing at least one of information, goods, and services to the user interface; and
performing the transaction with the second temporary fictitious identity to conceal the real identity and private information of the user interface from the secondary service provider.
5. The method of claim 4 and further comprising:
concealing a real identity of a consumer using the user interface with the second temporary fictitious identity by at least one of following techniques:
masking a browser of the user interface with the second temporary fictitious identity;
passing all communications of the user interface through a server of the identity intermediary to assign the second temporary identity and obscure the real identity of the user interface from the service provider; and
assigning the user interface a substitute browser with a pseudonymous name recognizably issued by the identity intermediary.
6. The method of claim 1 and further comprising:
assigning a second temporary fictitious identity from the identity intermediary to the user interface;
performing the transaction between the user interface and the service provider using the first and second temporary fictitious identities of the service provider and the user interface, respectively;
establishing a link to a financial services network to facilitate the identity intermediary performing the transaction as a financial transaction between the user interface and the service provider without revealing real financial information about a consumer using the user interface to the service provider and about the service provider to the user interface.
7. A method of network communications comprising:
contacting an identity intermediary with a service provider to obtain a first temporary network identity for the service provider including:
assigning, via the identity intermediary, the temporary network identity to include at least one of a personal component, a financial component, and a location component; and
associating, via the identity intermediary, the personal component with a real name of a consumer, associating the financial component with at least one of a real credit card number and a bank number, and associating the location component with at least one of a physical street address and an IP address; and
preventing, via the identity intermediary, unauthorized access to a database of the identity intermediary that maintains the personal, financial, and location components; and
contacting an user interface with the first temporary network identity of the service provider to provide services pseudonymously to the user interface.
8. The method of claim 7 and further comprising:
contacting the identity intermediary a second time to obtain a second temporary network identity for the service provider; and
contacting the user interface a second time with the second temporary network identity of the service provider to provide services pseudonymously to the user interface.
9. A method of network communications comprising:
contacting a service provider with a user interface;
prior to conveying personal information to the service provider, contacting an identity intermediary with the user interface to obtain a temporary network identity for the user interface; and
performing a transaction between the user interface and the service provider using the temporary network identity of the user interface to conceal a real identity of a consumer using the user interface.
10. The method of claim 9 and further comprising:
carrying out the transaction by having the identity intermediary use the real identity of the consumer associated with the user interface to arrange delivery of at least one of information and goods/services to the real consumer from the service provider while maintaining the user interface as fictitious identity relative to the service provider.
11. A method of providing pseudonymous network identities comprising:
randomly generating a first temporary fictitious identity for a first service provider; and
maintaining a database of a plurality of temporary fictitious identities, including the first temporary fictitious identity, with each temporary fictitious identity being associated with a uniquely identified service provider, including the first service provider.
12. The method of claim 11 and further comprising:
after a predetermined number of network communications involving the first temporary fictitious identity, replacing the first temporary fictitious identity with a randomly generated second temporary fictitious identity for association with the first service provider.
13. The method of claim 12 wherein replacing the first temporary fictitious identity occurs after a single communication of the first service provider with a user interface using the first fictitious temporary identity.
14. A network identity intermediary comprising:
a network site for communicating with a service provider; and
a database configured for maintaining at least one temporary pseudonymous identity in association with a real identity of the service provider;
wherein the network site is configured for assigning the temporary pseudonymous identity to the service provider upon a request by the service provider.
15. A temporary network identity comprising:
a unique pseudonymous identifier temporarily associated with a service provider; and
an identifier source name associated with the pseudonymous identifier for identifying the source that generated the unique pseudonymous identifier.
16. The temporary network identity of claim 15 wherein the unique pseudonymous identifier has a predetermined lifespan determined by at least one of a time period, a number of network communications between interface and the service provider, and a single interaction between a user interface and the service provider.
17. A network identity intermediary database comprising:
an array of unique pseudonymous identifiers;
an array of real identities of consumers and service providers including at least one of financial information, personal information, and location information, with each one of the real identities being exclusively associated with only one of the unique pseudonymous identifiers.
18. The network database of claim 17 and further comprising:
an encryption mechanism for concealing an association scheme between the unique pseudonymous identifiers and the real identities.
19. A method of network communications comprising:
contacting an identity intermediary with a user interface, after an initial contact between the user interface and a service provider, to obtain a first temporary network identity for the user interface;
contacting the service provider with the first temporary network identity of the user interface to receive services pseudonymously from the service provider; and
charging at least one of the user interface and the service provider a fee for the temporary network identity.
20. A method of pseudonymous network communication comprising:
creating a temporary fictitious identity for each of a service provider and a user interface for pseudonymously performing a transaction between the user interface and the service provider using the temporary fictitious identity; and
obtaining a fee from at least one of the user interface, the service provider and an advertising sponsor for the temporary fictitious identity.
21. A network identity intermediary database comprising:
an array of unique pseudonymous identifiers being configured so that each identifier will be associated exclusively with a real identity of each consumer of a plurality of consumers and each first service provider of a plurality of service providers; and
a subscriber mechanism for assigning the identifiers to the plurality of consumers and the service providers based on a fee-for-service contractual relationship based on at least one of a first arrangement between the consumer and the service provider, a second arrangement between the consumer and an identity intermediary for creating the identifiers, and a third arrangement between the service provider and the identity intermediary.
22. A pseudonymous network identity system comprising:
a network identity intermediary configured for communicating with a user interface and a service provider and configured for assigning a different temporary pseudonymous identity to each of a user interface and a service provider;
a database configured for maintaining at least one different temporary pseudonymous identity in association with a real identity of each of the user interface and the service provider; and
a fee mechanism configured for obtaining payment from the user interface and the service provider in association with maintaining the database and assigning the identities.
23. A computer-readable medium having computer-executable instructions for performing a method of facilitating network communications, the method comprising:
assigning a first temporary fictitious identity from an identity intermediary to a service provider;
performing a transaction between a user interface and the service provider using the first temporary fictitious identity.
24. The computer readable medium of claim 23 wherein the method of facilitating network communications further comprises:
associating the first temporary identity with the service provider;
providing the service provider as a primary service provider and linking the primary service provider to a secondary service provider, which assists the primary service provider in providing at least one of information, goods, and services to the user interface; and
performing the transaction with the first temporary fictitious identity to conceal the existence of, and real identity of, the secondary service provider from the user interface.
25. The computer readable medium of claim 23 wherein the method of facilitating network communications further comprises:
associating a second temporary identity with the user interface;
providing the service provider as a primary service provider and linking the primary service provider to a secondary service provider, which assists the primary service provider in providing at least one of information, goods, and services to the user interface; and
performing the transaction with the second temporary fictitious identity to conceal the real identity and private information of the user interface from the secondary service provider.
26. A computer-readable medium having computer-executable instructions for performing a method of network communications, the method comprising:
contacting an identity intermediary with a service provider to obtain a first temporary network identity for the service provider including:
assigning, via the identity intermediary, the temporary network identity to include at least one of a personal component, a financial component, and a location component; and
associating, via the identity intermediary, the personal component with a real name of a consumer, associating the financial component with at least one of a real credit card number and a bank number, and associating the location component with at least one of a physical street address and an IP address; and
preventing, via the identity intermediary, unauthorized access to a database of the identity intermediary that maintains the personal, financial, and location components; and
contacting an user interface with the first temporary network identity of the service provider to provide services pseudonymously to the user interface.
27. A computer-readable medium having computer-executable instructions for performing a method of network communications, the method comprising:
contacting a service provider with a user interface;
prior to conveying personal information to the service provider, contacting an identity intermediary with the user interface to obtain a temporary network identity for the user interface; and
performing a transaction between the user interface and the service provider using the temporary network identity of the user interface to conceal a real identity of a consumer using the user interface.
28. A computer-readable medium having computer-executable instructions for performing a method of providing pseudonymous network identities, the method comprising:
randomly generating a first temporary fictitious identity for a first service provider; and
maintaining a database of a plurality of temporary fictitious identities, including the first temporary fictitious identity, with each temporary fictitious identity being associated with a uniquely identified service provider, including the first service provider.
29. A computer-readable medium having computer-executable instructions for performing a method of operating a network identity intermediary, the method comprising:
providing a network site for communicating with a service provider; and
maintaining a database in cooperation with the network site for associating at least one temporary pseudonymous identity with a real identity of the service provider; and
assigning the temporary pseudonymous identity to the service provider upon a request at the network site by the service provider.
30. A computer-readable medium having computer-executable instructions for performing a method of providing temporary network identities, the method comprising:
associating a unique pseudonymous identifier temporarily with a service provider; and
associating an identifier source name with the pseudonymous identifier for identifying the source that generated the unique pseudonymous identifier.
31. A computer-readable medium having computer-executable instructions for performing a method of providing a network identity intermediary database, the method comprising:
maintaining an array of unique pseudonymous identifiers;
maintaining an array of real identities of consumers and service providers including at least one of financial information, personal information, and location information, with each one of the real identities being exclusively associated with only one of the unique pseudonymous identifiers.
US09901518 2001-07-09 2001-07-09 Method and system for temporary network identity Active 2023-09-07 US6937976B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09901518 US6937976B2 (en) 2001-07-09 2001-07-09 Method and system for temporary network identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09901518 US6937976B2 (en) 2001-07-09 2001-07-09 Method and system for temporary network identity

Publications (2)

Publication Number Publication Date
US20030009593A1 true US20030009593A1 (en) 2003-01-09
US6937976B2 true US6937976B2 (en) 2005-08-30

Family

ID=25414347

Family Applications (1)

Application Number Title Priority Date Filing Date
US09901518 Active 2023-09-07 US6937976B2 (en) 2001-07-09 2001-07-09 Method and system for temporary network identity

Country Status (1)

Country Link
US (1) US6937976B2 (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061263A1 (en) * 2005-09-14 2007-03-15 Novell, Inc. Crafted identities
US20080196098A1 (en) * 2004-12-31 2008-08-14 Cottrell Lance M System For Protecting Identity in a Network Environment
US20090077638A1 (en) * 2007-09-17 2009-03-19 Novell, Inc. Setting and synching preferred credentials in a disparate credential store environment
US20090094161A1 (en) * 2007-10-04 2009-04-09 Novell, Inc. Provisioning users to multiple agencies
US20090125417A1 (en) * 2002-11-29 2009-05-14 Alfano Nicholas P Method for conducting an electronic commercial transaction
US7689504B2 (en) 2001-11-01 2010-03-30 Jpmorgan Chase Bank, N.A. System and method for establishing or modifying an account with user selectable terms
US7735122B1 (en) * 2003-08-29 2010-06-08 Novell, Inc. Credential mapping
US7756816B2 (en) 2002-10-02 2010-07-13 Jpmorgan Chase Bank, N.A. System and method for network-based project management
US7966496B2 (en) 1999-07-02 2011-06-21 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US20120078727A1 (en) * 2009-12-30 2012-03-29 Wei-Yeh Lee Facilitation of user management of unsolicited server operations via modification thereof
US20120084151A1 (en) * 2009-12-30 2012-04-05 Kozak Frank J Facilitation of user management of unsolicited server operations and extensions thereto
US20120084349A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee User interface for user management and control of unsolicited server operations
US20120084348A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee Facilitation of user management of unsolicited server operations
US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
US20120150710A1 (en) * 2009-08-21 2012-06-14 Hopac (Proprietary) Limited method and system for facilitating access to financial information
US8301493B2 (en) * 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8335855B2 (en) 2001-09-19 2012-12-18 Jpmorgan Chase Bank, N.A. System and method for portal infrastructure tracking
US8468330B1 (en) 2003-06-30 2013-06-18 Oracle International Corporation Methods, systems, and data structures for loading and authenticating a module
US8473735B1 (en) 2007-05-17 2013-06-25 Jpmorgan Chase Systems and methods for managing digital certificates
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US8793490B1 (en) 2006-07-14 2014-07-29 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
CN102439936B (en) * 2009-04-08 2015-02-25 瑞典爱立信有限公司 Controller and computer program for privacy management in an identity network
US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US9372987B1 (en) * 2014-08-04 2016-06-21 Anonyome Labs, Inc. Apparatus and method for masking a real user controlling synthetic identities
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030027573A1 (en) * 2001-08-02 2003-02-06 Skysoft Co.,Ltd. Masked identification code registration system and masked registration method
US7218721B1 (en) * 2002-01-02 2007-05-15 8X8, Inc. Virtual telephone extension
US7770204B2 (en) * 2003-09-30 2010-08-03 Novell, Inc. Techniques for securing electronic identities
US7587197B2 (en) * 2006-03-21 2009-09-08 Sony Ericsson Mobile Communications Ab Method and system for maintaining anonymity of a mobile radio terminal
US7984169B2 (en) * 2006-06-28 2011-07-19 Microsoft Corporation Anonymous and secure network-based interaction
DE102006034026A1 (en) * 2006-07-17 2008-01-24 Beiersdorf Ag The cosmetic stick
US9398113B2 (en) 2007-07-07 2016-07-19 Qualcomm Incorporated Methods and systems for providing targeted information using identity masking in a wireless communications device
US9392074B2 (en) 2007-07-07 2016-07-12 Qualcomm Incorporated User profile generation architecture for mobile content-message targeting
US20110110518A1 (en) * 2008-08-14 2011-05-12 Searete Llc Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US8929208B2 (en) * 2008-08-14 2015-01-06 The Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110081018A1 (en) * 2008-08-14 2011-04-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US8850044B2 (en) * 2008-08-14 2014-09-30 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
US20110166973A1 (en) * 2008-08-14 2011-07-07 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US8224907B2 (en) 2008-08-14 2012-07-17 The Invention Science Fund I, Llc System and method for transmitting illusory identification characteristics
US20110093806A1 (en) * 2008-08-14 2011-04-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US8626848B2 (en) * 2008-08-14 2014-01-07 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity
US20110107427A1 (en) * 2008-08-14 2011-05-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US9659188B2 (en) * 2008-08-14 2017-05-23 Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
US8730836B2 (en) * 2008-08-14 2014-05-20 The Invention Science Fund I, Llc Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US20110131409A1 (en) * 2008-08-14 2011-06-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US9641537B2 (en) * 2008-08-14 2017-05-02 Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110041185A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US20100042667A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory identification characteristics
US20100318595A1 (en) * 2008-08-14 2010-12-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for conditionally transmitting one or more locum tenentes
US20100039218A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory and non-illusory identification characteristics
US20110166972A1 (en) * 2008-08-14 2011-07-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US8583553B2 (en) * 2008-08-14 2013-11-12 The Invention Science Fund I, Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US8738729B2 (en) * 2010-07-21 2014-05-27 Apple Inc. Virtual access module distribution apparatus and methods
US20160014129A1 (en) * 2014-07-08 2016-01-14 Google Inc. User Control of Data De-Idenfication

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475735A (en) * 1993-12-02 1995-12-12 Motorola, Inc. Method of providing wireless local loop operation with local mobility for a subscribed unit
US5812670A (en) 1995-12-28 1998-09-22 Micali; Silvio Traceable anonymous transactions
US5905736A (en) 1996-04-22 1999-05-18 At&T Corp Method for the billing of transactions over the internet
US5961593A (en) * 1997-01-22 1999-10-05 Lucent Technologies, Inc. System and method for providing anonymous personalized browsing by a proxy system in a network
US6119000A (en) * 1996-05-03 2000-09-12 Hewlett-Packard Company Method and apparatus for tracking identity-code changes in a communications system
US6137884A (en) * 1995-03-21 2000-10-24 Bankers Trust Corporation Simultaneous electronic transactions with visible trusted parties
US6148342A (en) 1998-01-27 2000-11-14 Ho; Andrew P. Secure database management system for confidential records using separately encrypted identifier and access request
JP2001243300A (en) * 2000-03-01 2001-09-07 Hotpot:Kk Service providing system
US20020129279A1 (en) * 2000-04-04 2002-09-12 Spacey Simon Alan Methods and apparatus usable with or applicable to the use of the internet
US6571092B2 (en) * 2001-02-15 2003-05-27 Nokia Networks Oy Technique for enabling emergency call callback of a terminal without a valid subscriber identity
WO2003094475A1 (en) * 2002-04-30 2003-11-13 Telefonaktiebolaget Lm Ericsson (Publ) A method for providing a communications network subscriber with an anonymous temporary subscriber identity and a dual anonymous communication system
US6697625B1 (en) * 1999-11-19 2004-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Method in a communication network

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475735A (en) * 1993-12-02 1995-12-12 Motorola, Inc. Method of providing wireless local loop operation with local mobility for a subscribed unit
US6137884A (en) * 1995-03-21 2000-10-24 Bankers Trust Corporation Simultaneous electronic transactions with visible trusted parties
US5812670A (en) 1995-12-28 1998-09-22 Micali; Silvio Traceable anonymous transactions
US5905736A (en) 1996-04-22 1999-05-18 At&T Corp Method for the billing of transactions over the internet
US6119000A (en) * 1996-05-03 2000-09-12 Hewlett-Packard Company Method and apparatus for tracking identity-code changes in a communications system
US5961593A (en) * 1997-01-22 1999-10-05 Lucent Technologies, Inc. System and method for providing anonymous personalized browsing by a proxy system in a network
US6148342A (en) 1998-01-27 2000-11-14 Ho; Andrew P. Secure database management system for confidential records using separately encrypted identifier and access request
US6697625B1 (en) * 1999-11-19 2004-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Method in a communication network
JP2001243300A (en) * 2000-03-01 2001-09-07 Hotpot:Kk Service providing system
US20020129279A1 (en) * 2000-04-04 2002-09-12 Spacey Simon Alan Methods and apparatus usable with or applicable to the use of the internet
US6571092B2 (en) * 2001-02-15 2003-05-27 Nokia Networks Oy Technique for enabling emergency call callback of a terminal without a valid subscriber identity
WO2003094475A1 (en) * 2002-04-30 2003-11-13 Telefonaktiebolaget Lm Ericsson (Publ) A method for providing a communications network subscriber with an anonymous temporary subscriber identity and a dual anonymous communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Global System for Mobile Communications", Beaudry et al, Telesis, n94, pp. 52-59 (Jul. 1992). *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8590008B1 (en) 1999-07-02 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services
US7966496B2 (en) 1999-07-02 2011-06-21 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
US8335855B2 (en) 2001-09-19 2012-12-18 Jpmorgan Chase Bank, N.A. System and method for portal infrastructure tracking
US7689504B2 (en) 2001-11-01 2010-03-30 Jpmorgan Chase Bank, N.A. System and method for establishing or modifying an account with user selectable terms
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US8707410B2 (en) 2001-12-04 2014-04-22 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US7756816B2 (en) 2002-10-02 2010-07-13 Jpmorgan Chase Bank, N.A. System and method for network-based project management
US8301493B2 (en) * 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US20090125417A1 (en) * 2002-11-29 2009-05-14 Alfano Nicholas P Method for conducting an electronic commercial transaction
US8468330B1 (en) 2003-06-30 2013-06-18 Oracle International Corporation Methods, systems, and data structures for loading and authenticating a module
US7735122B1 (en) * 2003-08-29 2010-06-08 Novell, Inc. Credential mapping
US20080196098A1 (en) * 2004-12-31 2008-08-14 Cottrell Lance M System For Protecting Identity in a Network Environment
US8375434B2 (en) 2004-12-31 2013-02-12 Ntrepid Corporation System for protecting identity in a network environment
US20070061263A1 (en) * 2005-09-14 2007-03-15 Novell, Inc. Crafted identities
US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US9661021B2 (en) 2005-09-19 2017-05-23 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US8793490B1 (en) 2006-07-14 2014-07-29 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
US9240012B1 (en) 2006-07-14 2016-01-19 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
US9679293B1 (en) 2006-07-14 2017-06-13 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
US8473735B1 (en) 2007-05-17 2013-06-25 Jpmorgan Chase Systems and methods for managing digital certificates
US8726011B1 (en) 2007-05-17 2014-05-13 Jpmorgan Chase Bank, N.A. Systems and methods for managing digital certificates
US20090077638A1 (en) * 2007-09-17 2009-03-19 Novell, Inc. Setting and synching preferred credentials in a disparate credential store environment
US20090094161A1 (en) * 2007-10-04 2009-04-09 Novell, Inc. Provisioning users to multiple agencies
US8117650B2 (en) 2007-10-04 2012-02-14 Novell Intellectual Property Holdings, Inc. Provisioning users to multiple agencies
US8549315B2 (en) 2008-01-24 2013-10-01 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
CN102439936B (en) * 2009-04-08 2015-02-25 瑞典爱立信有限公司 Controller and computer program for privacy management in an identity network
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
US20120150710A1 (en) * 2009-08-21 2012-06-14 Hopac (Proprietary) Limited method and system for facilitating access to financial information
US20120084348A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee Facilitation of user management of unsolicited server operations
US20120078727A1 (en) * 2009-12-30 2012-03-29 Wei-Yeh Lee Facilitation of user management of unsolicited server operations via modification thereof
US20120084151A1 (en) * 2009-12-30 2012-04-05 Kozak Frank J Facilitation of user management of unsolicited server operations and extensions thereto
US20120084349A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee User interface for user management and control of unsolicited server operations
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
US9372987B1 (en) * 2014-08-04 2016-06-21 Anonyome Labs, Inc. Apparatus and method for masking a real user controlling synthetic identities

Also Published As

Publication number Publication date Type
US20030009593A1 (en) 2003-01-09 application

Similar Documents

Publication Publication Date Title
US7324972B1 (en) Managing transactions on a network: four or more parties
Cranor Internet privacy
Jøsang et al. Trust requirements in identity management
US7290278B2 (en) Identity based service system
US6385729B1 (en) Secure token device access to services provided by an internet service provider (ISP)
US7552466B2 (en) Web site identity assurance
US7085840B2 (en) Enhanced quality of identification in a data communications network
US7610390B2 (en) Distributed network identity
US6941282B1 (en) Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US6898577B1 (en) Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts
US7275260B2 (en) Enhanced privacy protection in identification in a data communications network
US7356837B2 (en) Centralized identification and authentication system and method
US20030033516A1 (en) Rapid application security threat analysis
US8365266B2 (en) Trusted local single sign-on
US6529885B1 (en) Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
US7203845B2 (en) Multiple trust modes for handling data
US7865414B2 (en) Method, system and computer readable medium for web site account and e-commerce management from a central location
US6957199B1 (en) Method, system and service for conducting authenticated business transactions
US20070037552A1 (en) Method and system for performing two factor mutual authentication
US7200578B2 (en) Method and system for anonymizing purchase data
US20040030887A1 (en) System and method for providing secure communications between clients and service providers
US20020007323A1 (en) Order placement and payment settlement system
US20010029496A1 (en) Systems and methods for providing anonymous financial transactions
US7496751B2 (en) Privacy and identification in a data communications network
US5883810A (en) Electronic online commerce card with transactionproxy number for online transactions

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD COMPANY, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:APTE, NARESH ANANT;REEL/FRAME:012216/0230

Effective date: 20010621

AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., COLORAD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:APTE, NARESH ANANT;REEL/FRAME:013867/0393

Effective date: 20020828

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12